It’s that time of year again.  The “boys of summer” begin another season with high expectations and the goal of appearing in baseball’s post season.  All thirty Major League Baseball teams spend the off-season developing a plan to gain the competitive advantage and improve their position over last year. They discuss and create a strategy to fill voids to increase their chances of making the play-offs.  Unfortunately, due to budgetary limitations, inability to keep and attract free agents, or the lack of a realistic plan, many major league teams will not be able to successfully execute on their strategy.

The same is true with your BYOD strategy. Enabling employees to utilize their personal device to access corporate network resources seems like a great way to reduce capital expenses by allowing employees to provide their own mobile device, as well as increase worker productivity. Seems like a great plan, doesn’t it. But not being able to control a device, such as a smartphone or tablet, the company doesn’t own, is one of the challenges facing IT departments. However, it can be addressed with solutions such as App VPN and container technologies.

But the real obstacle enterprises face today is not technical, but legal. The question is, “how do companies ensure that employees understand and acknowledge the BYOD policy provided and approved by their legal department?”  Implementing consumer rights protection as identified by local jurisdictions is critical to executing a successful BYOD strategy. Today, companies have been forced to improvise by implementing manual systems either through email, submission of a physical form, or the use of a portal to get employees to acknowledge the policy.

The best way to ensure acknowledgement and acceptance of the BYOD policy is to integrate the process in the workflow. The technology incorporated in the Dell Secure Mobile Access (SMA) solution recently announced at Interop 2014 integrates a workflow that requires employees to accept a company’s BYOD policy prior to getting access to the corporate network.  In fact, unlike other vendor’s attempts to address the compliance issue, the employee’s personal device is not authorized to access the corporate network until the user accepts the corporate policy. Dell SMA protects the company from legal ramifications as it provides the means for the company to push down the policy upon initial and access as well as any subsequent changes to that policy.  And since BYOD compliance differs based on local jurisdictions, Secure Mobile Access enables the administrator to organize policies based on groups or communities thereby assuring the pertinent agreement are accepted.


Just as in major league baseball, the success of one’s strategy is dependent upon the ability to implement and execute.  Sometimes the tools are readily available. And when they are, enterprises need to take advantage and incorporate them quickly and effectively. Dell’s new Secure Mobile Access solution is the advantage enterprises need to maximize employee’s productivity and truly benefit from the BYOD trend.

Join our webinar on April 22 to learn more about Dell Secure Mobile Access: Click here.